Sciweavers

348 search results - page 50 / 70
» Secure Computation on the Web: Computing without Simultaneou...
Sort
View
CHI
1994
ACM
15 years 5 months ago
Toolglass and magic lenses: the see-through interface
ToolglassTM widgets are new user interface tools that can appear, as though on a transparent sheet of glass, between an application and a traditional cursor. They can be positione...
Eric A. Bier, Maureen C. Stone, Kenneth A. Pier, K...
HCI
2009
14 years 11 months ago
COBRA - A Visualization Solution to Monitor and Analyze Consumer Generated Medias
Consumer Generated Medias (CGMs) -- such as blogs, news forums, message boards, and web pages -- are emerging as locations where consumers trade, discuss and influence each other&#...
Amit Behal, Julia Grace, Linda Kato, Ying Chen, Sh...
AAMAS
1999
Springer
15 years 1 months ago
Verifying Compliance with Commitment Protocols
Interaction protocols are specific, often standard, constraints on the behaviors of autonomous agents in a multiagent system. Protocols are essential to the functioning of open sys...
Mahadevan Venkatraman, Munindar P. Singh
CVPR
2011
IEEE
14 years 5 months ago
Activity Recognition using Dynamic Subspace Angles
Cameras are ubiquitous everywhere and hold the promise of significantly changing the way we live and interact with our environment. Human activity recognition is central to under...
Octavia Camps, Mario Sznaier, Binlong Li, Teresa M...
CHI
2011
ACM
14 years 5 months ago
Of passwords and people: measuring the effect of password-composition policies
Text-based passwords are the most common mechanism for authenticating humans to computer systems. To prevent users from picking passwords that are too easy for an adversary to gue...
Saranga Komanduri, Richard Shay, Patrick Gage Kell...